Which of the following security solutions would prevent a user from reading a file that they did not create?

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Counter Mode (CTR)

A block cipher mode of operations that uses nonce combined with a counter that is encrypted.

TPM (Trusted Platform Module)

A hardware chip on the motherboard included with many |aptops and some mobile devices. It provides full disk encryption.

Which algorithms are used in asymmetric encryption?

RSA and Diffie-Hellman

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called

Salting

Which of the following terms means a cryptography mechanism that hides secret communications within various forms of data?

Steganography

Rainbow Table Attack

The attacker uses a list of hashed data to match the cleartext version.

EFS

Encrypting File System. A feature within NTFS on Windows systems that supports encrypting individual files or folders for confidentiality.

What is the main function of a TPM hardware chip?

Generate and store cryptographic keys

HSM (Hardware Security Module)

a dedicated cryptographic processor often used in high-security environments like financial institutions, and it can be removed and replaced as needed.

BitLocker

a microsoft utility to encrypt a full drive

secure enclave

a separate, isolated environment within the device's processor where sensitive data can be securely stored and processed.

Transparent Data Encryption (TDE)

database encryption methods that encrypts the entire database and all backups

Which of the following is used to verify that a downloaded file has not been altered?

hash


Set pelajaran terkait

Nutrition Chapter 4 Review Questions

View Set

Quiz - Class 8 - Free Throws, Point of Interruption and Correctable Errors

View Set

The Bush and Clinton Presidencies 222

View Set